Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Introduction of Tampering the Microsoft word

Category: Computer Sciences Paper Type: Assignment Writing Reference: APA Words: 2100

The access control system can be referred to a complete security feature of the windows that provide access to the resources in the operating system. several types of applications can call the function of an access control system for the specific resources and the control access for the resources (Networkworld. com, 2017). The access control system is the gravity of a computer security system, that controls the resources, programs, and executes the shared data analysis on the principles. In the present work, an overview of the security model describes the controlling access for the objects and applications in windows such as through files of Microsoft word (Securereading. com, 2018). The access controlling system requires the setting of the system for the administrative functions and high-level description is considered for the access control system and how the interaction of attackers with the system can be controlled by the several processes. The present work proposes alternative solutions to preserve the system and information security process from the malware attacks. The prevention and modification for the internal and external consistency are considered to reduce the unwanted attacks (Networkworld. com, 2017).

Assumptions of Tampering the Microsoft word

Microsoft word can be used to launch multistage attacks in a system and to access the confidential data. The data breaching contains the exploiting process for macros, embedded scripts and automatic interaction of the user with the malware files. There are mainly four requirements of data security including authenticity, availability, integrity, and confidentiality for the insurance of data security (Blog. malwarebytes. com, 2017; Securereading. com, 2018). The attacker can view the contents of a specific Microsoft word document file that is not open to access for an anonymous user. The analysis is subjected to some conditions that are mentioned below,

1.      There are no exploitable vulnerabilities existing in the system.

2.      The attacker uses a non-privileged account on the system (Blog. malwarebytes. com, 2017).

3.      The basic system of the access control process does not provide permission to access the files and the attacker requires other information and cannot access the control system directly.

4.      The attacker is not able to physically tamper the system in any way (Securereading. com, 2018).

Core security mechanism of windows

The members of cybercrime are putting efforts to reduce the malware attacks and threats of crimes. But at the same time, the attackers are getting more advanced to find the new methods to gain control in any system for the data breaching. The attackers dragged the company to suffer from lots of risks and to recollect the data from the backup system. In the present work, different scenarios are considered to evaluate the processes regarding the harm of Microsoft word files by the attackers (Blog. malwarebytes. com, 2017). The analysis includes consideration for the security architecture of the Microsoft organization and services to prevent the malware attacks. The issues regarding the attacks and handling of the security process in the organization can be accessed easily for the malware attacks. The attackers can use an unauthorized account on the system, the mechanism used by the controlling system of the organization is different for unauthorized users. The approaches are different for the activities of the organization related to the services and the issues of security (Securereading. com, 2018; Blog. malwarebytes. com, 2017).

Functions of the access control mechanism

The security process is essential for the proper functioning of the operating system. the access control mechanism provides security in the operating system and prevents attacks. The security process allows the users to do several functions but at the same time restricts unauthorized use of the system (Blog. malwarebytes. com, 2017). All the windows operating systems are developed in such a way that it uses windows 9x system to have use of access control. There are two different approaches for the monitoring of access in the operating system of windows and these approaches include common level access monitoring and user level access monitoring (Networkworld. com, 2017). The common level access monitoring system is an easy process for the allocation of the resources. In this process, all the data is shared by providing resources of full access and read-only access. In case of user level access monitoring system, the network resources are used for the authentication of the user request for the proper access to the system (Blog. malwarebytes. com, 2017). The only security process in granting access towards the authorized system is related to the validation of password and username in the previously recorded user account database. The user level access monitoring system is related to Internet Security providing a process (Networkworld. com, 2017).

The low-level safety mechanism

The low-level safety mechanism includes visualization-based security, safe booting, Windows hollow, passport, authorization guard, system guard, and enterprise data security process. The visualization base Security System results in the primary standard for operating system security. The virtual based security system is the use of software as well as hardware mechanism for the generation of confined functional subgroup and secured system (Networkworld. com, 2017). The subsystem is generated by reserving, performing, protecting, and delivering the precise processor of the data in the subsystems. Such type of the operating system can be altered by using Visual Basic Unity systems (Blog. malwarebytes. com, 2017).

Operation of an access control mechanism

The virtual based security system in the Windows operating system provides guideline integrity and secure system. Safety mechanism used in all type of Windows operating systems and it considers bit locker and trust platform module chip for the preservation of the data in the boot process. In the case of Windows 7 operating systems, the significant importance for the security system is for the unified extensible firmware interface (Securereading. com, 2018). Unable to retrieve the highly conventional data through bios. In order to prevent unauthorized access in the low-level operating system the combined work of unified extensible firmware interface and Windows OS can be done. In Windows 10 OS name the method of Windows hello improves the security system and avoid from the use of storing passwords (Blog. malwarebytes. com, 2017). The focus of the method is biometric authentication that supports facial impression and fingerprints along with the pin codes different devices are developed for the authentication of the user and to avoid from the arrival of hackers. The Microsoft password is an innovative technique for a single sign-on a resolution that restores asymmetric key for the software and OS and protects the software from unwanted hacker attack (Securereading. com, 2018). The authorization guard is developed in Windows 10, it can be implemented to prevent any type of harsh attack. Authorization guard preserves expert and user-derived authority for the d connection of authentication services and prevents the authenticated data for which virtual based security. The protective element of security for the data and application is a system guard that operates in specific computers by using the hardware control visualization-based security system (Blog. malwarebytes. com, 2017). It can prevent integral information and important data of Windows OS. On a regular uses the bit locker process the data in case of hidden or stolen devices. It is an advanced application for the security of the system that is developed by windows OS (Blog. malwarebytes. com, 2017). The enterprise data security provides a constant level of file encryption and rights for the corporate files. The Windows operating system works as an agent to preserve the whole databases on the basis of different policies. The enterprise data security system is excellent in preserving corporate that isolating the data and recognizing the whole system (Securereading. com, 2018).

Characteristics of the security architecture of Windows operating system

The framework of security can be defined as a design or defect that illustrates the safety programs provided by the organization and how they are interconnected with the planning system. The controlling parameter present in the security architecture enables to have a protection level for the system and quality of the system such as confidentiality, integrity, and availability. In the present work, the modification of the implementation system in the security architecture related to the os privacy architecture is discussed (Essaycorp. com, 2019; Blog. malwarebytes. com, 2017). The windows operating system and security architecture provided by Microsoft improves the productivity and processing system of the data and enables the organization to transfer the data without any breaching. The main purpose of the improved security architecture is to prohibited security attacks. The reproduction process of functions combines the physical records and this method can be used to reproduce the functions (Networkworld. com, 2017). One of the important security services developed by the Windows operating system in security architecture is x800. The service of s800 is developed by using a protocol layer off for the broadcasting of the whole system. The system enables to preserve security system for the networks and devices.  The adventures of x800 system increase availability, data honesty, confidentiality of data, digital signatures, authorization, non-repudiation, routing control, and reduces the possibility of an external attack (Blog. malwarebytes. com, 2017)

Source:https://i2.wp.com/www.scconfigmgr.com/wp-content/uploads/2018/06/Security-OverView.jpg?resize=846%2C568&ssl=1

Reason for failure

There can be several reason which can be they cause of the failure of the security architectures and these all causes must be overcomes for solving the problem and performing task smoothly. The failures of the security are now observed all the platforms of the. With the passage of time this issue is going to become the mores and more changeling for preventing and detecting the unexpected crashes of the system. There are few problems observed which is considered as the root cause for the failure of the security architectures (Kabai, 2013). These all reason are;

·         There is lack of awareness in the standards of the security

·         The requirement of the security are not defined.

·         Lack of communication among the development team and product

·         Errors in design for introducing the security loop holes

·         The issues in coding and bad programming

·         Missing security test plans 

Alternative solution security architecture

The plan of action is includes in the solution for solving the problems of the security architecture as well as by following the below given step the reason of the security architecture can be overcomes easily (Wojciech Mazurczyk, 2013). These steps are;

·         The management of the organization must be run the security program for their all teams with their organization.

·         The training program must be organized by the management for maintaining the requirements and standards of the security architecture. It is also used for the development of the team and product management

·         The use of the software tool must be promoted for the maintenance and development process which can help for detecting the violations of the security for measuring the score codes.

·         There are different tools which are used as the alternative for the security architecture for example CAST Application Intelligence Platform is one of these tools which can used to performing the static analysis for covering the all requires of the security.

  

Source: https://cloudblogs.microsoft.com/uploads/prod/sites/13/2018/08/Microsoft-365-Security-integrates-with-your-broader-IT-ecosystem-1-1024x919.png

Security limitations

The limitation of the security architecture can be explained in the wider scenario but it is related to the proper use of the security architecture is mostly used for Windows operating system.

·         WOS is wider view of the field and now days it commonly used in every organization.

·         Security architecture is providing the several functions for reducing the external consistency.

·         Security architecture system provide the accurate function for the use WOS on small devices.

Conclusion on Tampering the Microsoft word

It is concluded that an overview of the security model describes the controlling access for the objects and applications in windows such as through files of Microsoft word. The attackers can use an unauthorized account on the system, the mechanism used by the controlling system of the organization is different for unauthorized users. Most importantly, The Microsoft password is an innovative technique for a single sign-on a resolution that restores asymmetric key for the software and OS and protects the software from unwanted hacker attack. This paper has concluded the research for the failure of the security architecture along with the plan of action for solving all these issues.

References of Tampering the Microsoft word

Blog. malwarebytes. com. (2017, 10 13). Decoy Microsoft Word document delivers malware through a RAT. Retrieved from blog.malwarebytes.com: https://blog.malwarebytes.com/threat-analysis/2017/10/decoy-microsoft-word-document-delivers-malware-through-rat/

Essaycorp. com. (2019). The Core Security Mechanism for Windows. Retrieved from www.essaycorp.com: https://www.essaycorp.com/sample/core-security-mechanism-windows.pdf

Kabai, I. (2013). 8 Reasons Enterprise Architecture Programs Fail. informationweek.

Networkworld. com. (2017, 05 10). Email-based attacks exploit unpatched vulnerability in Microsoft Word. Retrieved from www.networkworld.com: https://www.networkworld.com/article/3187796/email-based-attacks-exploit-unpatched-vulnerability-in-microsoft-word.html

Securereading. com. (2018, 10 29). New Attack Technique uses Microsoft Word and Youtube Videos to Deliver Malware. Retrieved from securereading.com: https://securereading.com/new-attack-technique-uses-microsoft-word-and-youtube-videos-to-deliver-malware/

Wojciech Mazurczyk, Z. K. (2013). Alternative security architecture for IP Telephonybased on digital watermarking. Arxiv Org.

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Math Exam Success

ONLINE

Math Exam Success

1239 Orders Completed

Best Coursework Help

ONLINE

Best Coursework Help

1554 Orders Completed

Top Grade Tutor

ONLINE

Top Grade Tutor

11445 Orders Completed